Unauthorized Access in Healthcare

Unauthorized Access in Healthcare Organizations Identified by Huntress

Huntress, a cybersecurity firm, has uncovered a series of unauthorized access incidents targeting multiple healthcare organizations. These incidents indicate internal reconnaissance and suggest preparation for further malicious activities. The attackers…

Read more
Secplicity-The-443-Podcast-274

Secplicity The 443 Podcast – Episode 274 – RIPE for the Taking

This week's coverage includes several significant cybersecurity events: Password Compromise at a Spanish Mobile Telco: A mobile telecommunications company in Spain suffered a major security breach due to a password…

Read more
Secplicity-The-443-Podcast-273

Secplicity The 443 Podcast – Episode 273 – Hacking the Crypto Supply Chain

This week's podcast highlights key developments in cybersecurity: Supply Chain Attack on Cryptocurrency Wallet Manufacturer: The episode begins with a discussion on a significant supply chain attack targeting one of…

Read more
Secplicity-The-443-Podcast-272

Secplicity The 443 Podcast – Episode 272 – Bluetooth Busted

This week's podcast episode focuses on several critical cybersecurity issues: Unauthenticated Keystroke Injection Vulnerability in Bluetooth: The episode starts with an in-depth discussion about a new and alarming vulnerability found…

Read more
Secplicity-The-443-Podcast-271

Secplicity The 443 Podcast – Episode 271 – 2024 Security Predictions

This week's podcast episode delves into forward-looking insights in the realm of cybersecurity, providing six key predictions for 2024. Each prediction is accompanied by an analysis of the trends driving…

Read more
Secplicity-The-443-Podcast-269

Secplicity The 443 Podcast – Episode 269 – What to Expect from NIS2

In this week's podcast episode, the focus is on significant developments in cybersecurity, particularly in the European Union and regarding prominent cyber threat actors: EU’s Network and Information Security (NIS2)…

Read more
Cybersecurity Strategies

Components and Modern Technologies in Cybersecurity Strategies

In this post we will look at the components of a cybersecurity strategy and the technologies that go into it. Components That Form Part Of A Cyber Security Strategy To…

Read more
Guarding Against a Spectrum of Cyber Threats: The Diverse Landscape of Cybersecurity Defenses

Guarding Against a Spectrum of Cyber Threats: The Diverse Landscape of Cybersecurity Defenses

In this post we will look at the different types of threats that cybersecurity professionals work to keep the company they work for safe from. Malware Malware is the name…

Read more
Phishing Attack Statistics

2023 Phishing Attack Statistics

In this post we will look at phishing attack statistics for 2023. Phishing attacks are quite a common way to attempt to compromise accounts and potentially infrastructures as well depending…

Read more
Vendor-Email-Compromise

FAQ – Vendor Email Compromise, What Is It?

References: https://ironscales.com/glossary/vendor-email-compromise Vendor Email Compromise - How Does It Work? VEC usually starts with a malicious threat actor that gains access to a vendors email account. This is usually done…

Read more